Behavioral task
behavioral1
Sample
2024-07-27_69ceacb7ea3d7f376976fbf12b1240e9_lockbit.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-27_69ceacb7ea3d7f376976fbf12b1240e9_lockbit.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-27_69ceacb7ea3d7f376976fbf12b1240e9_lockbit
-
Size
165KB
-
MD5
69ceacb7ea3d7f376976fbf12b1240e9
-
SHA1
b9b8aae66e3348e3de9fa1f42ee993484abf28aa
-
SHA256
bb537c270fc33bb7ab03d5fa9056b274db3b9e4f73c858b980d9e88bf48804a7
-
SHA512
0735c11543d52a0617cda98a70f2f10f2e9b16c0bc1f90958b666fb9d22e0bfaef1facfc82ea3d2ddca763b9e3e9a77b9db47d5de42a61843bcf9b41e6f71797
-
SSDEEP
3072:o9K3Y2oTgnZbG1Q1RieB7gIB4HKm/lgYs+4ylDe:SK7Pn5d1RiehgIBo1nq
Malware Config
Signatures
-
Detects LgoogLoader payload 1 IoCs
resource yara_rule sample family_lgoogloader -
Lgoogloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-27_69ceacb7ea3d7f376976fbf12b1240e9_lockbit
Files
-
2024-07-27_69ceacb7ea3d7f376976fbf12b1240e9_lockbit.exe windows:6 windows x86 arch:x86
625d3bbf2ce862f2dd2f97a50e86cb4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
GetProcAddress
GetModuleHandleW
GetSystemDirectoryA
LoadLibraryA
VirtualAlloc
WideCharToMultiByte
MultiByteToWideChar
QueryFullProcessImageNameW
SetFilePointer
WriteFile
FlushFileBuffers
MoveFileExW
GetFileSize
ReadFile
GetModuleHandleA
VirtualQuery
GetSystemTimeAsFileTime
OpenProcess
lstrcatA
lstrcpyA
GlobalMemoryStatusEx
CreateEventW
LocalAlloc
LocalFree
WaitForDebugEvent
ContinueDebugEvent
HeapFree
ResumeThread
SetThreadContext
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
VirtualQueryEx
GetThreadContext
GetProcessHeap
HeapAlloc
DeleteFileW
GetTempPathW
CloseHandle
GetLastError
CreateFileW
Sleep
DeviceIoControl
GetSystemDirectoryW
CreateProcessW
TerminateProcess
WaitForSingleObject
GetCurrentProcess
GetCurrentProcessId
GetLongPathNameW
user32
EnumDisplayDevicesA
wsprintfW
advapi32
RegOpenKeyExW
OpenProcessToken
EnumServicesStatusExW
RegQueryValueExW
RegCloseKey
RegQueryValueExA
RegEnumKeyW
RegQueryInfoKeyW
LookupPrivilegeValueW
CreateProcessAsUserW
CloseServiceHandle
OpenSCManagerW
CreateWellKnownSid
ole32
CoInitializeEx
CoGetObject
CoCreateGuid
CoUninitialize
shlwapi
StrStrA
StrNCatA
StrStrIA
StrStrIW
StrChrA
StrCpyW
StrCmpNIW
StrCatW
PathAppendW
PathFileExistsW
PathAppendA
StrStrW
StrChrW
wininet
HttpOpenRequestW
InternetSetOptionW
HttpQueryInfoW
HttpSendRequestW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetOpenW
InternetConnectW
InternetQueryOptionW
HttpAddRequestHeadersW
ntdll
NtClose
NtOpenSymbolicLinkObject
NtAllocateVirtualMemory
RtlAcquirePebLock
RtlReleasePebLock
LdrEnumerateLoadedModules
NtRemoveProcessDebug
DbgUiSetThreadDebugObject
NtDuplicateObject
NtQueryInformationToken
RtlSubAuthorityCountSid
RtlSubAuthoritySid
NtQueryInformationProcess
RtlGetVersion
NtQuerySymbolicLinkObject
rpcrt4
RpcAsyncInitializeHandle
RpcStringBindingComposeW
RpcBindingFromStringBindingW
RpcStringFreeW
RpcBindingSetAuthInfoExW
RpcBindingFree
RpcAsyncCompleteCall
RpcRaiseException
NdrAsyncClientCall
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ